1 /* 2 * Copyright (C) 2016 Netronome Systems, Inc. 3 * 4 * This software is dual licensed under the GNU General License Version 2, 5 * June 1991 as shown in the file COPYING in the top-level directory of this 6 * source tree or the BSD 2-Clause License provided below. You have the 7 * option to license this software under the complete terms of either license. 8 * 9 * The BSD 2-Clause License: 10 * 11 * Redistribution and use in source and binary forms, with or 12 * without modification, are permitted provided that the following 13 * conditions are met: 14 * 15 * 1. Redistributions of source code must retain the above 16 * copyright notice, this list of conditions and the following 17 * disclaimer. 18 * 19 * 2. Redistributions in binary form must reproduce the above 20 * copyright notice, this list of conditions and the following 21 * disclaimer in the documentation and/or other materials 22 * provided with the distribution. 23 * 24 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, 25 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF 26 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND 27 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS 28 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN 29 * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN 30 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 31 * SOFTWARE. 32 */ 33 34 #define pr_fmt(fmt) "NFP net bpf: " fmt 35 36 #include <linux/kernel.h> 37 #include <linux/bpf.h> 38 #include <linux/filter.h> 39 #include <linux/pkt_cls.h> 40 #include <linux/unistd.h> 41 42 #include "main.h" 43 #include "../nfp_asm.h" 44 45 /* --- NFP prog --- */ 46 /* Foreach "multiple" entries macros provide pos and next<n> pointers. 47 * It's safe to modify the next pointers (but not pos). 48 */ 49 #define nfp_for_each_insn_walk2(nfp_prog, pos, next) \ 50 for (pos = list_first_entry(&(nfp_prog)->insns, typeof(*pos), l), \ 51 next = list_next_entry(pos, l); \ 52 &(nfp_prog)->insns != &pos->l && \ 53 &(nfp_prog)->insns != &next->l; \ 54 pos = nfp_meta_next(pos), \ 55 next = nfp_meta_next(pos)) 56 57 #define nfp_for_each_insn_walk3(nfp_prog, pos, next, next2) \ 58 for (pos = list_first_entry(&(nfp_prog)->insns, typeof(*pos), l), \ 59 next = list_next_entry(pos, l), \ 60 next2 = list_next_entry(next, l); \ 61 &(nfp_prog)->insns != &pos->l && \ 62 &(nfp_prog)->insns != &next->l && \ 63 &(nfp_prog)->insns != &next2->l; \ 64 pos = nfp_meta_next(pos), \ 65 next = nfp_meta_next(pos), \ 66 next2 = nfp_meta_next(next)) 67 68 static bool 69 nfp_meta_has_next(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 70 { 71 return meta->l.next != &nfp_prog->insns; 72 } 73 74 static bool 75 nfp_meta_has_prev(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 76 { 77 return meta->l.prev != &nfp_prog->insns; 78 } 79 80 static void nfp_prog_free(struct nfp_prog *nfp_prog) 81 { 82 struct nfp_insn_meta *meta, *tmp; 83 84 list_for_each_entry_safe(meta, tmp, &nfp_prog->insns, l) { 85 list_del(&meta->l); 86 kfree(meta); 87 } 88 kfree(nfp_prog); 89 } 90 91 static void nfp_prog_push(struct nfp_prog *nfp_prog, u64 insn) 92 { 93 if (nfp_prog->__prog_alloc_len == nfp_prog->prog_len) { 94 nfp_prog->error = -ENOSPC; 95 return; 96 } 97 98 nfp_prog->prog[nfp_prog->prog_len] = insn; 99 nfp_prog->prog_len++; 100 } 101 102 static unsigned int nfp_prog_current_offset(struct nfp_prog *nfp_prog) 103 { 104 return nfp_prog->start_off + nfp_prog->prog_len; 105 } 106 107 static unsigned int 108 nfp_prog_offset_to_index(struct nfp_prog *nfp_prog, unsigned int offset) 109 { 110 return offset - nfp_prog->start_off; 111 } 112 113 /* --- Emitters --- */ 114 static void 115 __emit_cmd(struct nfp_prog *nfp_prog, enum cmd_tgt_map op, 116 u8 mode, u8 xfer, u8 areg, u8 breg, u8 size, bool sync) 117 { 118 enum cmd_ctx_swap ctx; 119 u64 insn; 120 121 if (sync) 122 ctx = CMD_CTX_SWAP; 123 else 124 ctx = CMD_CTX_NO_SWAP; 125 126 insn = FIELD_PREP(OP_CMD_A_SRC, areg) | 127 FIELD_PREP(OP_CMD_CTX, ctx) | 128 FIELD_PREP(OP_CMD_B_SRC, breg) | 129 FIELD_PREP(OP_CMD_TOKEN, cmd_tgt_act[op].token) | 130 FIELD_PREP(OP_CMD_XFER, xfer) | 131 FIELD_PREP(OP_CMD_CNT, size) | 132 FIELD_PREP(OP_CMD_SIG, sync) | 133 FIELD_PREP(OP_CMD_TGT_CMD, cmd_tgt_act[op].tgt_cmd) | 134 FIELD_PREP(OP_CMD_MODE, mode); 135 136 nfp_prog_push(nfp_prog, insn); 137 } 138 139 static void 140 emit_cmd(struct nfp_prog *nfp_prog, enum cmd_tgt_map op, 141 u8 mode, u8 xfer, swreg lreg, swreg rreg, u8 size, bool sync) 142 { 143 struct nfp_insn_re_regs reg; 144 int err; 145 146 err = swreg_to_restricted(reg_none(), lreg, rreg, ®, false); 147 if (err) { 148 nfp_prog->error = err; 149 return; 150 } 151 if (reg.swap) { 152 pr_err("cmd can't swap arguments\n"); 153 nfp_prog->error = -EFAULT; 154 return; 155 } 156 if (reg.dst_lmextn || reg.src_lmextn) { 157 pr_err("cmd can't use LMextn\n"); 158 nfp_prog->error = -EFAULT; 159 return; 160 } 161 162 __emit_cmd(nfp_prog, op, mode, xfer, reg.areg, reg.breg, size, sync); 163 } 164 165 static void 166 __emit_br(struct nfp_prog *nfp_prog, enum br_mask mask, enum br_ev_pip ev_pip, 167 enum br_ctx_signal_state css, u16 addr, u8 defer) 168 { 169 u16 addr_lo, addr_hi; 170 u64 insn; 171 172 addr_lo = addr & (OP_BR_ADDR_LO >> __bf_shf(OP_BR_ADDR_LO)); 173 addr_hi = addr != addr_lo; 174 175 insn = OP_BR_BASE | 176 FIELD_PREP(OP_BR_MASK, mask) | 177 FIELD_PREP(OP_BR_EV_PIP, ev_pip) | 178 FIELD_PREP(OP_BR_CSS, css) | 179 FIELD_PREP(OP_BR_DEFBR, defer) | 180 FIELD_PREP(OP_BR_ADDR_LO, addr_lo) | 181 FIELD_PREP(OP_BR_ADDR_HI, addr_hi); 182 183 nfp_prog_push(nfp_prog, insn); 184 } 185 186 static void emit_br_def(struct nfp_prog *nfp_prog, u16 addr, u8 defer) 187 { 188 if (defer > 2) { 189 pr_err("BUG: branch defer out of bounds %d\n", defer); 190 nfp_prog->error = -EFAULT; 191 return; 192 } 193 __emit_br(nfp_prog, BR_UNC, BR_EV_PIP_UNCOND, BR_CSS_NONE, addr, defer); 194 } 195 196 static void 197 emit_br(struct nfp_prog *nfp_prog, enum br_mask mask, u16 addr, u8 defer) 198 { 199 __emit_br(nfp_prog, mask, 200 mask != BR_UNC ? BR_EV_PIP_COND : BR_EV_PIP_UNCOND, 201 BR_CSS_NONE, addr, defer); 202 } 203 204 static void 205 __emit_br_byte(struct nfp_prog *nfp_prog, u8 areg, u8 breg, bool imm8, 206 u8 byte, bool equal, u16 addr, u8 defer, bool src_lmextn) 207 { 208 u16 addr_lo, addr_hi; 209 u64 insn; 210 211 addr_lo = addr & (OP_BB_ADDR_LO >> __bf_shf(OP_BB_ADDR_LO)); 212 addr_hi = addr != addr_lo; 213 214 insn = OP_BBYTE_BASE | 215 FIELD_PREP(OP_BB_A_SRC, areg) | 216 FIELD_PREP(OP_BB_BYTE, byte) | 217 FIELD_PREP(OP_BB_B_SRC, breg) | 218 FIELD_PREP(OP_BB_I8, imm8) | 219 FIELD_PREP(OP_BB_EQ, equal) | 220 FIELD_PREP(OP_BB_DEFBR, defer) | 221 FIELD_PREP(OP_BB_ADDR_LO, addr_lo) | 222 FIELD_PREP(OP_BB_ADDR_HI, addr_hi) | 223 FIELD_PREP(OP_BB_SRC_LMEXTN, src_lmextn); 224 225 nfp_prog_push(nfp_prog, insn); 226 } 227 228 static void 229 emit_br_byte_neq(struct nfp_prog *nfp_prog, 230 swreg src, u8 imm, u8 byte, u16 addr, u8 defer) 231 { 232 struct nfp_insn_re_regs reg; 233 int err; 234 235 err = swreg_to_restricted(reg_none(), src, reg_imm(imm), ®, true); 236 if (err) { 237 nfp_prog->error = err; 238 return; 239 } 240 241 __emit_br_byte(nfp_prog, reg.areg, reg.breg, reg.i8, byte, false, addr, 242 defer, reg.src_lmextn); 243 } 244 245 static void 246 __emit_immed(struct nfp_prog *nfp_prog, u16 areg, u16 breg, u16 imm_hi, 247 enum immed_width width, bool invert, 248 enum immed_shift shift, bool wr_both, 249 bool dst_lmextn, bool src_lmextn) 250 { 251 u64 insn; 252 253 insn = OP_IMMED_BASE | 254 FIELD_PREP(OP_IMMED_A_SRC, areg) | 255 FIELD_PREP(OP_IMMED_B_SRC, breg) | 256 FIELD_PREP(OP_IMMED_IMM, imm_hi) | 257 FIELD_PREP(OP_IMMED_WIDTH, width) | 258 FIELD_PREP(OP_IMMED_INV, invert) | 259 FIELD_PREP(OP_IMMED_SHIFT, shift) | 260 FIELD_PREP(OP_IMMED_WR_AB, wr_both) | 261 FIELD_PREP(OP_IMMED_SRC_LMEXTN, src_lmextn) | 262 FIELD_PREP(OP_IMMED_DST_LMEXTN, dst_lmextn); 263 264 nfp_prog_push(nfp_prog, insn); 265 } 266 267 static void 268 emit_immed(struct nfp_prog *nfp_prog, swreg dst, u16 imm, 269 enum immed_width width, bool invert, enum immed_shift shift) 270 { 271 struct nfp_insn_ur_regs reg; 272 int err; 273 274 if (swreg_type(dst) == NN_REG_IMM) { 275 nfp_prog->error = -EFAULT; 276 return; 277 } 278 279 err = swreg_to_unrestricted(dst, dst, reg_imm(imm & 0xff), ®); 280 if (err) { 281 nfp_prog->error = err; 282 return; 283 } 284 285 __emit_immed(nfp_prog, reg.areg, reg.breg, imm >> 8, width, 286 invert, shift, reg.wr_both, 287 reg.dst_lmextn, reg.src_lmextn); 288 } 289 290 static void 291 __emit_shf(struct nfp_prog *nfp_prog, u16 dst, enum alu_dst_ab dst_ab, 292 enum shf_sc sc, u8 shift, 293 u16 areg, enum shf_op op, u16 breg, bool i8, bool sw, bool wr_both, 294 bool dst_lmextn, bool src_lmextn) 295 { 296 u64 insn; 297 298 if (!FIELD_FIT(OP_SHF_SHIFT, shift)) { 299 nfp_prog->error = -EFAULT; 300 return; 301 } 302 303 if (sc == SHF_SC_L_SHF) 304 shift = 32 - shift; 305 306 insn = OP_SHF_BASE | 307 FIELD_PREP(OP_SHF_A_SRC, areg) | 308 FIELD_PREP(OP_SHF_SC, sc) | 309 FIELD_PREP(OP_SHF_B_SRC, breg) | 310 FIELD_PREP(OP_SHF_I8, i8) | 311 FIELD_PREP(OP_SHF_SW, sw) | 312 FIELD_PREP(OP_SHF_DST, dst) | 313 FIELD_PREP(OP_SHF_SHIFT, shift) | 314 FIELD_PREP(OP_SHF_OP, op) | 315 FIELD_PREP(OP_SHF_DST_AB, dst_ab) | 316 FIELD_PREP(OP_SHF_WR_AB, wr_both) | 317 FIELD_PREP(OP_SHF_SRC_LMEXTN, src_lmextn) | 318 FIELD_PREP(OP_SHF_DST_LMEXTN, dst_lmextn); 319 320 nfp_prog_push(nfp_prog, insn); 321 } 322 323 static void 324 emit_shf(struct nfp_prog *nfp_prog, swreg dst, 325 swreg lreg, enum shf_op op, swreg rreg, enum shf_sc sc, u8 shift) 326 { 327 struct nfp_insn_re_regs reg; 328 int err; 329 330 err = swreg_to_restricted(dst, lreg, rreg, ®, true); 331 if (err) { 332 nfp_prog->error = err; 333 return; 334 } 335 336 __emit_shf(nfp_prog, reg.dst, reg.dst_ab, sc, shift, 337 reg.areg, op, reg.breg, reg.i8, reg.swap, reg.wr_both, 338 reg.dst_lmextn, reg.src_lmextn); 339 } 340 341 static void 342 __emit_alu(struct nfp_prog *nfp_prog, u16 dst, enum alu_dst_ab dst_ab, 343 u16 areg, enum alu_op op, u16 breg, bool swap, bool wr_both, 344 bool dst_lmextn, bool src_lmextn) 345 { 346 u64 insn; 347 348 insn = OP_ALU_BASE | 349 FIELD_PREP(OP_ALU_A_SRC, areg) | 350 FIELD_PREP(OP_ALU_B_SRC, breg) | 351 FIELD_PREP(OP_ALU_DST, dst) | 352 FIELD_PREP(OP_ALU_SW, swap) | 353 FIELD_PREP(OP_ALU_OP, op) | 354 FIELD_PREP(OP_ALU_DST_AB, dst_ab) | 355 FIELD_PREP(OP_ALU_WR_AB, wr_both) | 356 FIELD_PREP(OP_ALU_SRC_LMEXTN, src_lmextn) | 357 FIELD_PREP(OP_ALU_DST_LMEXTN, dst_lmextn); 358 359 nfp_prog_push(nfp_prog, insn); 360 } 361 362 static void 363 emit_alu(struct nfp_prog *nfp_prog, swreg dst, 364 swreg lreg, enum alu_op op, swreg rreg) 365 { 366 struct nfp_insn_ur_regs reg; 367 int err; 368 369 err = swreg_to_unrestricted(dst, lreg, rreg, ®); 370 if (err) { 371 nfp_prog->error = err; 372 return; 373 } 374 375 __emit_alu(nfp_prog, reg.dst, reg.dst_ab, 376 reg.areg, op, reg.breg, reg.swap, reg.wr_both, 377 reg.dst_lmextn, reg.src_lmextn); 378 } 379 380 static void 381 __emit_ld_field(struct nfp_prog *nfp_prog, enum shf_sc sc, 382 u8 areg, u8 bmask, u8 breg, u8 shift, bool imm8, 383 bool zero, bool swap, bool wr_both, 384 bool dst_lmextn, bool src_lmextn) 385 { 386 u64 insn; 387 388 insn = OP_LDF_BASE | 389 FIELD_PREP(OP_LDF_A_SRC, areg) | 390 FIELD_PREP(OP_LDF_SC, sc) | 391 FIELD_PREP(OP_LDF_B_SRC, breg) | 392 FIELD_PREP(OP_LDF_I8, imm8) | 393 FIELD_PREP(OP_LDF_SW, swap) | 394 FIELD_PREP(OP_LDF_ZF, zero) | 395 FIELD_PREP(OP_LDF_BMASK, bmask) | 396 FIELD_PREP(OP_LDF_SHF, shift) | 397 FIELD_PREP(OP_LDF_WR_AB, wr_both) | 398 FIELD_PREP(OP_LDF_SRC_LMEXTN, src_lmextn) | 399 FIELD_PREP(OP_LDF_DST_LMEXTN, dst_lmextn); 400 401 nfp_prog_push(nfp_prog, insn); 402 } 403 404 static void 405 emit_ld_field_any(struct nfp_prog *nfp_prog, swreg dst, u8 bmask, swreg src, 406 enum shf_sc sc, u8 shift, bool zero) 407 { 408 struct nfp_insn_re_regs reg; 409 int err; 410 411 /* Note: ld_field is special as it uses one of the src regs as dst */ 412 err = swreg_to_restricted(dst, dst, src, ®, true); 413 if (err) { 414 nfp_prog->error = err; 415 return; 416 } 417 418 __emit_ld_field(nfp_prog, sc, reg.areg, bmask, reg.breg, shift, 419 reg.i8, zero, reg.swap, reg.wr_both, 420 reg.dst_lmextn, reg.src_lmextn); 421 } 422 423 static void 424 emit_ld_field(struct nfp_prog *nfp_prog, swreg dst, u8 bmask, swreg src, 425 enum shf_sc sc, u8 shift) 426 { 427 emit_ld_field_any(nfp_prog, dst, bmask, src, sc, shift, false); 428 } 429 430 static void emit_nop(struct nfp_prog *nfp_prog) 431 { 432 __emit_immed(nfp_prog, UR_REG_IMM, UR_REG_IMM, 0, 0, 0, 0, 0, 0, 0); 433 } 434 435 /* --- Wrappers --- */ 436 static bool pack_immed(u32 imm, u16 *val, enum immed_shift *shift) 437 { 438 if (!(imm & 0xffff0000)) { 439 *val = imm; 440 *shift = IMMED_SHIFT_0B; 441 } else if (!(imm & 0xff0000ff)) { 442 *val = imm >> 8; 443 *shift = IMMED_SHIFT_1B; 444 } else if (!(imm & 0x0000ffff)) { 445 *val = imm >> 16; 446 *shift = IMMED_SHIFT_2B; 447 } else { 448 return false; 449 } 450 451 return true; 452 } 453 454 static void wrp_immed(struct nfp_prog *nfp_prog, swreg dst, u32 imm) 455 { 456 enum immed_shift shift; 457 u16 val; 458 459 if (pack_immed(imm, &val, &shift)) { 460 emit_immed(nfp_prog, dst, val, IMMED_WIDTH_ALL, false, shift); 461 } else if (pack_immed(~imm, &val, &shift)) { 462 emit_immed(nfp_prog, dst, val, IMMED_WIDTH_ALL, true, shift); 463 } else { 464 emit_immed(nfp_prog, dst, imm & 0xffff, IMMED_WIDTH_ALL, 465 false, IMMED_SHIFT_0B); 466 emit_immed(nfp_prog, dst, imm >> 16, IMMED_WIDTH_WORD, 467 false, IMMED_SHIFT_2B); 468 } 469 } 470 471 /* ur_load_imm_any() - encode immediate or use tmp register (unrestricted) 472 * If the @imm is small enough encode it directly in operand and return 473 * otherwise load @imm to a spare register and return its encoding. 474 */ 475 static swreg ur_load_imm_any(struct nfp_prog *nfp_prog, u32 imm, swreg tmp_reg) 476 { 477 if (FIELD_FIT(UR_REG_IMM_MAX, imm)) 478 return reg_imm(imm); 479 480 wrp_immed(nfp_prog, tmp_reg, imm); 481 return tmp_reg; 482 } 483 484 /* re_load_imm_any() - encode immediate or use tmp register (restricted) 485 * If the @imm is small enough encode it directly in operand and return 486 * otherwise load @imm to a spare register and return its encoding. 487 */ 488 static swreg re_load_imm_any(struct nfp_prog *nfp_prog, u32 imm, swreg tmp_reg) 489 { 490 if (FIELD_FIT(RE_REG_IMM_MAX, imm)) 491 return reg_imm(imm); 492 493 wrp_immed(nfp_prog, tmp_reg, imm); 494 return tmp_reg; 495 } 496 497 static void 498 wrp_br_special(struct nfp_prog *nfp_prog, enum br_mask mask, 499 enum br_special special) 500 { 501 emit_br(nfp_prog, mask, 0, 0); 502 503 nfp_prog->prog[nfp_prog->prog_len - 1] |= 504 FIELD_PREP(OP_BR_SPECIAL, special); 505 } 506 507 static void wrp_mov(struct nfp_prog *nfp_prog, swreg dst, swreg src) 508 { 509 emit_alu(nfp_prog, dst, reg_none(), ALU_OP_NONE, src); 510 } 511 512 static void wrp_reg_mov(struct nfp_prog *nfp_prog, u16 dst, u16 src) 513 { 514 wrp_mov(nfp_prog, reg_both(dst), reg_b(src)); 515 } 516 517 static int 518 data_ld(struct nfp_prog *nfp_prog, swreg offset, u8 dst_gpr, int size) 519 { 520 unsigned int i; 521 u16 shift, sz; 522 523 /* We load the value from the address indicated in @offset and then 524 * shift out the data we don't need. Note: this is big endian! 525 */ 526 sz = max(size, 4); 527 shift = size < 4 ? 4 - size : 0; 528 529 emit_cmd(nfp_prog, CMD_TGT_READ8, CMD_MODE_32b, 0, 530 pptr_reg(nfp_prog), offset, sz - 1, true); 531 532 i = 0; 533 if (shift) 534 emit_shf(nfp_prog, reg_both(dst_gpr), reg_none(), SHF_OP_NONE, 535 reg_xfer(0), SHF_SC_R_SHF, shift * 8); 536 else 537 for (; i * 4 < size; i++) 538 wrp_mov(nfp_prog, reg_both(dst_gpr + i), reg_xfer(i)); 539 540 if (i < 2) 541 wrp_immed(nfp_prog, reg_both(dst_gpr + 1), 0); 542 543 return 0; 544 } 545 546 static int 547 data_ld_host_order(struct nfp_prog *nfp_prog, u8 src_gpr, swreg offset, 548 u8 dst_gpr, int size) 549 { 550 unsigned int i; 551 u8 mask, sz; 552 553 /* We load the value from the address indicated in @offset and then 554 * mask out the data we don't need. Note: this is little endian! 555 */ 556 sz = max(size, 4); 557 mask = size < 4 ? GENMASK(size - 1, 0) : 0; 558 559 emit_cmd(nfp_prog, CMD_TGT_READ32_SWAP, CMD_MODE_32b, 0, 560 reg_a(src_gpr), offset, sz / 4 - 1, true); 561 562 i = 0; 563 if (mask) 564 emit_ld_field_any(nfp_prog, reg_both(dst_gpr), mask, 565 reg_xfer(0), SHF_SC_NONE, 0, true); 566 else 567 for (; i * 4 < size; i++) 568 wrp_mov(nfp_prog, reg_both(dst_gpr + i), reg_xfer(i)); 569 570 if (i < 2) 571 wrp_immed(nfp_prog, reg_both(dst_gpr + 1), 0); 572 573 return 0; 574 } 575 576 static int 577 construct_data_ind_ld(struct nfp_prog *nfp_prog, u16 offset, u16 src, u8 size) 578 { 579 swreg tmp_reg; 580 581 /* Calculate the true offset (src_reg + imm) */ 582 tmp_reg = ur_load_imm_any(nfp_prog, offset, imm_b(nfp_prog)); 583 emit_alu(nfp_prog, imm_both(nfp_prog), reg_a(src), ALU_OP_ADD, tmp_reg); 584 585 /* Check packet length (size guaranteed to fit b/c it's u8) */ 586 emit_alu(nfp_prog, imm_a(nfp_prog), 587 imm_a(nfp_prog), ALU_OP_ADD, reg_imm(size)); 588 emit_alu(nfp_prog, reg_none(), 589 plen_reg(nfp_prog), ALU_OP_SUB, imm_a(nfp_prog)); 590 wrp_br_special(nfp_prog, BR_BLO, OP_BR_GO_ABORT); 591 592 /* Load data */ 593 return data_ld(nfp_prog, imm_b(nfp_prog), 0, size); 594 } 595 596 static int construct_data_ld(struct nfp_prog *nfp_prog, u16 offset, u8 size) 597 { 598 swreg tmp_reg; 599 600 /* Check packet length */ 601 tmp_reg = ur_load_imm_any(nfp_prog, offset + size, imm_a(nfp_prog)); 602 emit_alu(nfp_prog, reg_none(), plen_reg(nfp_prog), ALU_OP_SUB, tmp_reg); 603 wrp_br_special(nfp_prog, BR_BLO, OP_BR_GO_ABORT); 604 605 /* Load data */ 606 tmp_reg = re_load_imm_any(nfp_prog, offset, imm_b(nfp_prog)); 607 return data_ld(nfp_prog, tmp_reg, 0, size); 608 } 609 610 static int 611 data_stx_host_order(struct nfp_prog *nfp_prog, u8 dst_gpr, swreg offset, 612 u8 src_gpr, u8 size) 613 { 614 unsigned int i; 615 616 for (i = 0; i * 4 < size; i++) 617 wrp_mov(nfp_prog, reg_xfer(i), reg_a(src_gpr + i)); 618 619 emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0, 620 reg_a(dst_gpr), offset, size - 1, true); 621 622 return 0; 623 } 624 625 static int 626 data_st_host_order(struct nfp_prog *nfp_prog, u8 dst_gpr, swreg offset, 627 u64 imm, u8 size) 628 { 629 wrp_immed(nfp_prog, reg_xfer(0), imm); 630 if (size == 8) 631 wrp_immed(nfp_prog, reg_xfer(1), imm >> 32); 632 633 emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0, 634 reg_a(dst_gpr), offset, size - 1, true); 635 636 return 0; 637 } 638 639 static void 640 wrp_alu_imm(struct nfp_prog *nfp_prog, u8 dst, enum alu_op alu_op, u32 imm) 641 { 642 swreg tmp_reg; 643 644 if (alu_op == ALU_OP_AND) { 645 if (!imm) 646 wrp_immed(nfp_prog, reg_both(dst), 0); 647 if (!imm || !~imm) 648 return; 649 } 650 if (alu_op == ALU_OP_OR) { 651 if (!~imm) 652 wrp_immed(nfp_prog, reg_both(dst), ~0U); 653 if (!imm || !~imm) 654 return; 655 } 656 if (alu_op == ALU_OP_XOR) { 657 if (!~imm) 658 emit_alu(nfp_prog, reg_both(dst), reg_none(), 659 ALU_OP_NEG, reg_b(dst)); 660 if (!imm || !~imm) 661 return; 662 } 663 664 tmp_reg = ur_load_imm_any(nfp_prog, imm, imm_b(nfp_prog)); 665 emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, tmp_reg); 666 } 667 668 static int 669 wrp_alu64_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 670 enum alu_op alu_op, bool skip) 671 { 672 const struct bpf_insn *insn = &meta->insn; 673 u64 imm = insn->imm; /* sign extend */ 674 675 if (skip) { 676 meta->skip = true; 677 return 0; 678 } 679 680 wrp_alu_imm(nfp_prog, insn->dst_reg * 2, alu_op, imm & ~0U); 681 wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, alu_op, imm >> 32); 682 683 return 0; 684 } 685 686 static int 687 wrp_alu64_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 688 enum alu_op alu_op) 689 { 690 u8 dst = meta->insn.dst_reg * 2, src = meta->insn.src_reg * 2; 691 692 emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, reg_b(src)); 693 emit_alu(nfp_prog, reg_both(dst + 1), 694 reg_a(dst + 1), alu_op, reg_b(src + 1)); 695 696 return 0; 697 } 698 699 static int 700 wrp_alu32_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 701 enum alu_op alu_op, bool skip) 702 { 703 const struct bpf_insn *insn = &meta->insn; 704 705 if (skip) { 706 meta->skip = true; 707 return 0; 708 } 709 710 wrp_alu_imm(nfp_prog, insn->dst_reg * 2, alu_op, insn->imm); 711 wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0); 712 713 return 0; 714 } 715 716 static int 717 wrp_alu32_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 718 enum alu_op alu_op) 719 { 720 u8 dst = meta->insn.dst_reg * 2, src = meta->insn.src_reg * 2; 721 722 emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, reg_b(src)); 723 wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0); 724 725 return 0; 726 } 727 728 static void 729 wrp_test_reg_one(struct nfp_prog *nfp_prog, u8 dst, enum alu_op alu_op, u8 src, 730 enum br_mask br_mask, u16 off) 731 { 732 emit_alu(nfp_prog, reg_none(), reg_a(dst), alu_op, reg_b(src)); 733 emit_br(nfp_prog, br_mask, off, 0); 734 } 735 736 static int 737 wrp_test_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 738 enum alu_op alu_op, enum br_mask br_mask) 739 { 740 const struct bpf_insn *insn = &meta->insn; 741 742 if (insn->off < 0) /* TODO */ 743 return -EOPNOTSUPP; 744 745 wrp_test_reg_one(nfp_prog, insn->dst_reg * 2, alu_op, 746 insn->src_reg * 2, br_mask, insn->off); 747 wrp_test_reg_one(nfp_prog, insn->dst_reg * 2 + 1, alu_op, 748 insn->src_reg * 2 + 1, br_mask, insn->off); 749 750 return 0; 751 } 752 753 static int 754 wrp_cmp_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 755 enum br_mask br_mask, bool swap) 756 { 757 const struct bpf_insn *insn = &meta->insn; 758 u64 imm = insn->imm; /* sign extend */ 759 u8 reg = insn->dst_reg * 2; 760 swreg tmp_reg; 761 762 if (insn->off < 0) /* TODO */ 763 return -EOPNOTSUPP; 764 765 tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog)); 766 if (!swap) 767 emit_alu(nfp_prog, reg_none(), reg_a(reg), ALU_OP_SUB, tmp_reg); 768 else 769 emit_alu(nfp_prog, reg_none(), tmp_reg, ALU_OP_SUB, reg_a(reg)); 770 771 tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog)); 772 if (!swap) 773 emit_alu(nfp_prog, reg_none(), 774 reg_a(reg + 1), ALU_OP_SUB_C, tmp_reg); 775 else 776 emit_alu(nfp_prog, reg_none(), 777 tmp_reg, ALU_OP_SUB_C, reg_a(reg + 1)); 778 779 emit_br(nfp_prog, br_mask, insn->off, 0); 780 781 return 0; 782 } 783 784 static int 785 wrp_cmp_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 786 enum br_mask br_mask, bool swap) 787 { 788 const struct bpf_insn *insn = &meta->insn; 789 u8 areg, breg; 790 791 areg = insn->dst_reg * 2; 792 breg = insn->src_reg * 2; 793 794 if (insn->off < 0) /* TODO */ 795 return -EOPNOTSUPP; 796 797 if (swap) { 798 areg ^= breg; 799 breg ^= areg; 800 areg ^= breg; 801 } 802 803 emit_alu(nfp_prog, reg_none(), reg_a(areg), ALU_OP_SUB, reg_b(breg)); 804 emit_alu(nfp_prog, reg_none(), 805 reg_a(areg + 1), ALU_OP_SUB_C, reg_b(breg + 1)); 806 emit_br(nfp_prog, br_mask, insn->off, 0); 807 808 return 0; 809 } 810 811 static void wrp_end32(struct nfp_prog *nfp_prog, swreg reg_in, u8 gpr_out) 812 { 813 emit_ld_field(nfp_prog, reg_both(gpr_out), 0xf, reg_in, 814 SHF_SC_R_ROT, 8); 815 emit_ld_field(nfp_prog, reg_both(gpr_out), 0x5, reg_a(gpr_out), 816 SHF_SC_R_ROT, 16); 817 } 818 819 /* --- Callbacks --- */ 820 static int mov_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 821 { 822 const struct bpf_insn *insn = &meta->insn; 823 824 wrp_reg_mov(nfp_prog, insn->dst_reg * 2, insn->src_reg * 2); 825 wrp_reg_mov(nfp_prog, insn->dst_reg * 2 + 1, insn->src_reg * 2 + 1); 826 827 return 0; 828 } 829 830 static int mov_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 831 { 832 u64 imm = meta->insn.imm; /* sign extend */ 833 834 wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2), imm & ~0U); 835 wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), imm >> 32); 836 837 return 0; 838 } 839 840 static int xor_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 841 { 842 return wrp_alu64_reg(nfp_prog, meta, ALU_OP_XOR); 843 } 844 845 static int xor_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 846 { 847 return wrp_alu64_imm(nfp_prog, meta, ALU_OP_XOR, !meta->insn.imm); 848 } 849 850 static int and_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 851 { 852 return wrp_alu64_reg(nfp_prog, meta, ALU_OP_AND); 853 } 854 855 static int and_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 856 { 857 return wrp_alu64_imm(nfp_prog, meta, ALU_OP_AND, !~meta->insn.imm); 858 } 859 860 static int or_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 861 { 862 return wrp_alu64_reg(nfp_prog, meta, ALU_OP_OR); 863 } 864 865 static int or_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 866 { 867 return wrp_alu64_imm(nfp_prog, meta, ALU_OP_OR, !meta->insn.imm); 868 } 869 870 static int add_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 871 { 872 const struct bpf_insn *insn = &meta->insn; 873 874 emit_alu(nfp_prog, reg_both(insn->dst_reg * 2), 875 reg_a(insn->dst_reg * 2), ALU_OP_ADD, 876 reg_b(insn->src_reg * 2)); 877 emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 878 reg_a(insn->dst_reg * 2 + 1), ALU_OP_ADD_C, 879 reg_b(insn->src_reg * 2 + 1)); 880 881 return 0; 882 } 883 884 static int add_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 885 { 886 const struct bpf_insn *insn = &meta->insn; 887 u64 imm = insn->imm; /* sign extend */ 888 889 wrp_alu_imm(nfp_prog, insn->dst_reg * 2, ALU_OP_ADD, imm & ~0U); 890 wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, ALU_OP_ADD_C, imm >> 32); 891 892 return 0; 893 } 894 895 static int sub_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 896 { 897 const struct bpf_insn *insn = &meta->insn; 898 899 emit_alu(nfp_prog, reg_both(insn->dst_reg * 2), 900 reg_a(insn->dst_reg * 2), ALU_OP_SUB, 901 reg_b(insn->src_reg * 2)); 902 emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 903 reg_a(insn->dst_reg * 2 + 1), ALU_OP_SUB_C, 904 reg_b(insn->src_reg * 2 + 1)); 905 906 return 0; 907 } 908 909 static int sub_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 910 { 911 const struct bpf_insn *insn = &meta->insn; 912 u64 imm = insn->imm; /* sign extend */ 913 914 wrp_alu_imm(nfp_prog, insn->dst_reg * 2, ALU_OP_SUB, imm & ~0U); 915 wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, ALU_OP_SUB_C, imm >> 32); 916 917 return 0; 918 } 919 920 static int shl_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 921 { 922 const struct bpf_insn *insn = &meta->insn; 923 u8 dst = insn->dst_reg * 2; 924 925 if (insn->imm < 32) { 926 emit_shf(nfp_prog, reg_both(dst + 1), 927 reg_a(dst + 1), SHF_OP_NONE, reg_b(dst), 928 SHF_SC_R_DSHF, 32 - insn->imm); 929 emit_shf(nfp_prog, reg_both(dst), 930 reg_none(), SHF_OP_NONE, reg_b(dst), 931 SHF_SC_L_SHF, insn->imm); 932 } else if (insn->imm == 32) { 933 wrp_reg_mov(nfp_prog, dst + 1, dst); 934 wrp_immed(nfp_prog, reg_both(dst), 0); 935 } else if (insn->imm > 32) { 936 emit_shf(nfp_prog, reg_both(dst + 1), 937 reg_none(), SHF_OP_NONE, reg_b(dst), 938 SHF_SC_L_SHF, insn->imm - 32); 939 wrp_immed(nfp_prog, reg_both(dst), 0); 940 } 941 942 return 0; 943 } 944 945 static int shr_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 946 { 947 const struct bpf_insn *insn = &meta->insn; 948 u8 dst = insn->dst_reg * 2; 949 950 if (insn->imm < 32) { 951 emit_shf(nfp_prog, reg_both(dst), 952 reg_a(dst + 1), SHF_OP_NONE, reg_b(dst), 953 SHF_SC_R_DSHF, insn->imm); 954 emit_shf(nfp_prog, reg_both(dst + 1), 955 reg_none(), SHF_OP_NONE, reg_b(dst + 1), 956 SHF_SC_R_SHF, insn->imm); 957 } else if (insn->imm == 32) { 958 wrp_reg_mov(nfp_prog, dst, dst + 1); 959 wrp_immed(nfp_prog, reg_both(dst + 1), 0); 960 } else if (insn->imm > 32) { 961 emit_shf(nfp_prog, reg_both(dst), 962 reg_none(), SHF_OP_NONE, reg_b(dst + 1), 963 SHF_SC_R_SHF, insn->imm - 32); 964 wrp_immed(nfp_prog, reg_both(dst + 1), 0); 965 } 966 967 return 0; 968 } 969 970 static int mov_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 971 { 972 const struct bpf_insn *insn = &meta->insn; 973 974 wrp_reg_mov(nfp_prog, insn->dst_reg * 2, insn->src_reg * 2); 975 wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0); 976 977 return 0; 978 } 979 980 static int mov_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 981 { 982 const struct bpf_insn *insn = &meta->insn; 983 984 wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2), insn->imm); 985 wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0); 986 987 return 0; 988 } 989 990 static int xor_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 991 { 992 return wrp_alu32_reg(nfp_prog, meta, ALU_OP_XOR); 993 } 994 995 static int xor_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 996 { 997 return wrp_alu32_imm(nfp_prog, meta, ALU_OP_XOR, !~meta->insn.imm); 998 } 999 1000 static int and_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1001 { 1002 return wrp_alu32_reg(nfp_prog, meta, ALU_OP_AND); 1003 } 1004 1005 static int and_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1006 { 1007 return wrp_alu32_imm(nfp_prog, meta, ALU_OP_AND, !~meta->insn.imm); 1008 } 1009 1010 static int or_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1011 { 1012 return wrp_alu32_reg(nfp_prog, meta, ALU_OP_OR); 1013 } 1014 1015 static int or_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1016 { 1017 return wrp_alu32_imm(nfp_prog, meta, ALU_OP_OR, !meta->insn.imm); 1018 } 1019 1020 static int add_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1021 { 1022 return wrp_alu32_reg(nfp_prog, meta, ALU_OP_ADD); 1023 } 1024 1025 static int add_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1026 { 1027 return wrp_alu32_imm(nfp_prog, meta, ALU_OP_ADD, !meta->insn.imm); 1028 } 1029 1030 static int sub_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1031 { 1032 return wrp_alu32_reg(nfp_prog, meta, ALU_OP_SUB); 1033 } 1034 1035 static int sub_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1036 { 1037 return wrp_alu32_imm(nfp_prog, meta, ALU_OP_SUB, !meta->insn.imm); 1038 } 1039 1040 static int shl_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1041 { 1042 const struct bpf_insn *insn = &meta->insn; 1043 1044 if (!insn->imm) 1045 return 1; /* TODO: zero shift means indirect */ 1046 1047 emit_shf(nfp_prog, reg_both(insn->dst_reg * 2), 1048 reg_none(), SHF_OP_NONE, reg_b(insn->dst_reg * 2), 1049 SHF_SC_L_SHF, insn->imm); 1050 wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0); 1051 1052 return 0; 1053 } 1054 1055 static int end_reg32(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1056 { 1057 const struct bpf_insn *insn = &meta->insn; 1058 u8 gpr = insn->dst_reg * 2; 1059 1060 switch (insn->imm) { 1061 case 16: 1062 emit_ld_field(nfp_prog, reg_both(gpr), 0x9, reg_b(gpr), 1063 SHF_SC_R_ROT, 8); 1064 emit_ld_field(nfp_prog, reg_both(gpr), 0xe, reg_a(gpr), 1065 SHF_SC_R_SHF, 16); 1066 1067 wrp_immed(nfp_prog, reg_both(gpr + 1), 0); 1068 break; 1069 case 32: 1070 wrp_end32(nfp_prog, reg_a(gpr), gpr); 1071 wrp_immed(nfp_prog, reg_both(gpr + 1), 0); 1072 break; 1073 case 64: 1074 wrp_mov(nfp_prog, imm_a(nfp_prog), reg_b(gpr + 1)); 1075 1076 wrp_end32(nfp_prog, reg_a(gpr), gpr + 1); 1077 wrp_end32(nfp_prog, imm_a(nfp_prog), gpr); 1078 break; 1079 } 1080 1081 return 0; 1082 } 1083 1084 static int imm_ld8_part2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1085 { 1086 wrp_immed(nfp_prog, reg_both(nfp_meta_prev(meta)->insn.dst_reg * 2 + 1), 1087 meta->insn.imm); 1088 1089 return 0; 1090 } 1091 1092 static int imm_ld8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1093 { 1094 const struct bpf_insn *insn = &meta->insn; 1095 1096 meta->double_cb = imm_ld8_part2; 1097 wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2), insn->imm); 1098 1099 return 0; 1100 } 1101 1102 static int data_ld1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1103 { 1104 return construct_data_ld(nfp_prog, meta->insn.imm, 1); 1105 } 1106 1107 static int data_ld2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1108 { 1109 return construct_data_ld(nfp_prog, meta->insn.imm, 2); 1110 } 1111 1112 static int data_ld4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1113 { 1114 return construct_data_ld(nfp_prog, meta->insn.imm, 4); 1115 } 1116 1117 static int data_ind_ld1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1118 { 1119 return construct_data_ind_ld(nfp_prog, meta->insn.imm, 1120 meta->insn.src_reg * 2, 1); 1121 } 1122 1123 static int data_ind_ld2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1124 { 1125 return construct_data_ind_ld(nfp_prog, meta->insn.imm, 1126 meta->insn.src_reg * 2, 2); 1127 } 1128 1129 static int data_ind_ld4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1130 { 1131 return construct_data_ind_ld(nfp_prog, meta->insn.imm, 1132 meta->insn.src_reg * 2, 4); 1133 } 1134 1135 static int mem_ldx_skb(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 1136 u8 size) 1137 { 1138 swreg dst = reg_both(meta->insn.dst_reg * 2); 1139 1140 switch (meta->insn.off) { 1141 case offsetof(struct sk_buff, len): 1142 if (size != FIELD_SIZEOF(struct sk_buff, len)) 1143 return -EOPNOTSUPP; 1144 wrp_mov(nfp_prog, dst, plen_reg(nfp_prog)); 1145 break; 1146 case offsetof(struct sk_buff, data): 1147 if (size != sizeof(void *)) 1148 return -EOPNOTSUPP; 1149 wrp_mov(nfp_prog, dst, pptr_reg(nfp_prog)); 1150 break; 1151 case offsetof(struct sk_buff, cb) + 1152 offsetof(struct bpf_skb_data_end, data_end): 1153 if (size != sizeof(void *)) 1154 return -EOPNOTSUPP; 1155 emit_alu(nfp_prog, dst, 1156 plen_reg(nfp_prog), ALU_OP_ADD, pptr_reg(nfp_prog)); 1157 break; 1158 default: 1159 return -EOPNOTSUPP; 1160 } 1161 1162 wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0); 1163 1164 return 0; 1165 } 1166 1167 static int mem_ldx_xdp(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 1168 u8 size) 1169 { 1170 swreg dst = reg_both(meta->insn.dst_reg * 2); 1171 1172 if (size != sizeof(void *)) 1173 return -EINVAL; 1174 1175 switch (meta->insn.off) { 1176 case offsetof(struct xdp_buff, data): 1177 wrp_mov(nfp_prog, dst, pptr_reg(nfp_prog)); 1178 break; 1179 case offsetof(struct xdp_buff, data_end): 1180 emit_alu(nfp_prog, dst, 1181 plen_reg(nfp_prog), ALU_OP_ADD, pptr_reg(nfp_prog)); 1182 break; 1183 default: 1184 return -EOPNOTSUPP; 1185 } 1186 1187 wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0); 1188 1189 return 0; 1190 } 1191 1192 static int 1193 mem_ldx_data(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 1194 unsigned int size) 1195 { 1196 swreg tmp_reg; 1197 1198 tmp_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog)); 1199 1200 return data_ld_host_order(nfp_prog, meta->insn.src_reg * 2, tmp_reg, 1201 meta->insn.dst_reg * 2, size); 1202 } 1203 1204 static int 1205 mem_ldx(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 1206 unsigned int size) 1207 { 1208 if (meta->ptr.type == PTR_TO_CTX) { 1209 if (nfp_prog->act == NN_ACT_XDP) 1210 return mem_ldx_xdp(nfp_prog, meta, size); 1211 else 1212 return mem_ldx_skb(nfp_prog, meta, size); 1213 } 1214 1215 if (meta->ptr.type == PTR_TO_PACKET) 1216 return mem_ldx_data(nfp_prog, meta, size); 1217 1218 return -EOPNOTSUPP; 1219 } 1220 1221 static int mem_ldx1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1222 { 1223 return mem_ldx(nfp_prog, meta, 1); 1224 } 1225 1226 static int mem_ldx2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1227 { 1228 return mem_ldx(nfp_prog, meta, 2); 1229 } 1230 1231 static int mem_ldx4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1232 { 1233 return mem_ldx(nfp_prog, meta, 4); 1234 } 1235 1236 static int mem_ldx8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1237 { 1238 return mem_ldx(nfp_prog, meta, 8); 1239 } 1240 1241 static int 1242 mem_st_data(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 1243 unsigned int size) 1244 { 1245 u64 imm = meta->insn.imm; /* sign extend */ 1246 swreg off_reg; 1247 1248 off_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog)); 1249 1250 return data_st_host_order(nfp_prog, meta->insn.dst_reg * 2, off_reg, 1251 imm, size); 1252 } 1253 1254 static int mem_st(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 1255 unsigned int size) 1256 { 1257 if (meta->ptr.type == PTR_TO_PACKET) 1258 return mem_st_data(nfp_prog, meta, size); 1259 1260 return -EOPNOTSUPP; 1261 } 1262 1263 static int mem_st1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1264 { 1265 return mem_st(nfp_prog, meta, 1); 1266 } 1267 1268 static int mem_st2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1269 { 1270 return mem_st(nfp_prog, meta, 2); 1271 } 1272 1273 static int mem_st4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1274 { 1275 return mem_st(nfp_prog, meta, 4); 1276 } 1277 1278 static int mem_st8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1279 { 1280 return mem_st(nfp_prog, meta, 8); 1281 } 1282 1283 static int 1284 mem_stx_data(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 1285 unsigned int size) 1286 { 1287 swreg off_reg; 1288 1289 off_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog)); 1290 1291 return data_stx_host_order(nfp_prog, meta->insn.dst_reg * 2, off_reg, 1292 meta->insn.src_reg * 2, size); 1293 } 1294 1295 static int 1296 mem_stx(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 1297 unsigned int size) 1298 { 1299 if (meta->ptr.type == PTR_TO_PACKET) 1300 return mem_stx_data(nfp_prog, meta, size); 1301 1302 return -EOPNOTSUPP; 1303 } 1304 1305 static int mem_stx1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1306 { 1307 return mem_stx(nfp_prog, meta, 1); 1308 } 1309 1310 static int mem_stx2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1311 { 1312 return mem_stx(nfp_prog, meta, 2); 1313 } 1314 1315 static int mem_stx4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1316 { 1317 return mem_stx(nfp_prog, meta, 4); 1318 } 1319 1320 static int mem_stx8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1321 { 1322 return mem_stx(nfp_prog, meta, 8); 1323 } 1324 1325 static int jump(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1326 { 1327 if (meta->insn.off < 0) /* TODO */ 1328 return -EOPNOTSUPP; 1329 emit_br(nfp_prog, BR_UNC, meta->insn.off, 0); 1330 1331 return 0; 1332 } 1333 1334 static int jeq_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1335 { 1336 const struct bpf_insn *insn = &meta->insn; 1337 u64 imm = insn->imm; /* sign extend */ 1338 swreg or1, or2, tmp_reg; 1339 1340 or1 = reg_a(insn->dst_reg * 2); 1341 or2 = reg_b(insn->dst_reg * 2 + 1); 1342 1343 if (insn->off < 0) /* TODO */ 1344 return -EOPNOTSUPP; 1345 1346 if (imm & ~0U) { 1347 tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog)); 1348 emit_alu(nfp_prog, imm_a(nfp_prog), 1349 reg_a(insn->dst_reg * 2), ALU_OP_XOR, tmp_reg); 1350 or1 = imm_a(nfp_prog); 1351 } 1352 1353 if (imm >> 32) { 1354 tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog)); 1355 emit_alu(nfp_prog, imm_b(nfp_prog), 1356 reg_a(insn->dst_reg * 2 + 1), ALU_OP_XOR, tmp_reg); 1357 or2 = imm_b(nfp_prog); 1358 } 1359 1360 emit_alu(nfp_prog, reg_none(), or1, ALU_OP_OR, or2); 1361 emit_br(nfp_prog, BR_BEQ, insn->off, 0); 1362 1363 return 0; 1364 } 1365 1366 static int jgt_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1367 { 1368 return wrp_cmp_imm(nfp_prog, meta, BR_BLO, true); 1369 } 1370 1371 static int jge_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1372 { 1373 return wrp_cmp_imm(nfp_prog, meta, BR_BHS, false); 1374 } 1375 1376 static int jlt_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1377 { 1378 return wrp_cmp_imm(nfp_prog, meta, BR_BLO, false); 1379 } 1380 1381 static int jle_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1382 { 1383 return wrp_cmp_imm(nfp_prog, meta, BR_BHS, true); 1384 } 1385 1386 static int jset_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1387 { 1388 const struct bpf_insn *insn = &meta->insn; 1389 u64 imm = insn->imm; /* sign extend */ 1390 swreg tmp_reg; 1391 1392 if (insn->off < 0) /* TODO */ 1393 return -EOPNOTSUPP; 1394 1395 if (!imm) { 1396 meta->skip = true; 1397 return 0; 1398 } 1399 1400 if (imm & ~0U) { 1401 tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog)); 1402 emit_alu(nfp_prog, reg_none(), 1403 reg_a(insn->dst_reg * 2), ALU_OP_AND, tmp_reg); 1404 emit_br(nfp_prog, BR_BNE, insn->off, 0); 1405 } 1406 1407 if (imm >> 32) { 1408 tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog)); 1409 emit_alu(nfp_prog, reg_none(), 1410 reg_a(insn->dst_reg * 2 + 1), ALU_OP_AND, tmp_reg); 1411 emit_br(nfp_prog, BR_BNE, insn->off, 0); 1412 } 1413 1414 return 0; 1415 } 1416 1417 static int jne_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1418 { 1419 const struct bpf_insn *insn = &meta->insn; 1420 u64 imm = insn->imm; /* sign extend */ 1421 swreg tmp_reg; 1422 1423 if (insn->off < 0) /* TODO */ 1424 return -EOPNOTSUPP; 1425 1426 if (!imm) { 1427 emit_alu(nfp_prog, reg_none(), reg_a(insn->dst_reg * 2), 1428 ALU_OP_OR, reg_b(insn->dst_reg * 2 + 1)); 1429 emit_br(nfp_prog, BR_BNE, insn->off, 0); 1430 return 0; 1431 } 1432 1433 tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog)); 1434 emit_alu(nfp_prog, reg_none(), 1435 reg_a(insn->dst_reg * 2), ALU_OP_XOR, tmp_reg); 1436 emit_br(nfp_prog, BR_BNE, insn->off, 0); 1437 1438 tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog)); 1439 emit_alu(nfp_prog, reg_none(), 1440 reg_a(insn->dst_reg * 2 + 1), ALU_OP_XOR, tmp_reg); 1441 emit_br(nfp_prog, BR_BNE, insn->off, 0); 1442 1443 return 0; 1444 } 1445 1446 static int jeq_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1447 { 1448 const struct bpf_insn *insn = &meta->insn; 1449 1450 if (insn->off < 0) /* TODO */ 1451 return -EOPNOTSUPP; 1452 1453 emit_alu(nfp_prog, imm_a(nfp_prog), reg_a(insn->dst_reg * 2), 1454 ALU_OP_XOR, reg_b(insn->src_reg * 2)); 1455 emit_alu(nfp_prog, imm_b(nfp_prog), reg_a(insn->dst_reg * 2 + 1), 1456 ALU_OP_XOR, reg_b(insn->src_reg * 2 + 1)); 1457 emit_alu(nfp_prog, reg_none(), 1458 imm_a(nfp_prog), ALU_OP_OR, imm_b(nfp_prog)); 1459 emit_br(nfp_prog, BR_BEQ, insn->off, 0); 1460 1461 return 0; 1462 } 1463 1464 static int jgt_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1465 { 1466 return wrp_cmp_reg(nfp_prog, meta, BR_BLO, true); 1467 } 1468 1469 static int jge_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1470 { 1471 return wrp_cmp_reg(nfp_prog, meta, BR_BHS, false); 1472 } 1473 1474 static int jlt_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1475 { 1476 return wrp_cmp_reg(nfp_prog, meta, BR_BLO, false); 1477 } 1478 1479 static int jle_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1480 { 1481 return wrp_cmp_reg(nfp_prog, meta, BR_BHS, true); 1482 } 1483 1484 static int jset_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1485 { 1486 return wrp_test_reg(nfp_prog, meta, ALU_OP_AND, BR_BNE); 1487 } 1488 1489 static int jne_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1490 { 1491 return wrp_test_reg(nfp_prog, meta, ALU_OP_XOR, BR_BNE); 1492 } 1493 1494 static int goto_out(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1495 { 1496 wrp_br_special(nfp_prog, BR_UNC, OP_BR_GO_OUT); 1497 1498 return 0; 1499 } 1500 1501 static const instr_cb_t instr_cb[256] = { 1502 [BPF_ALU64 | BPF_MOV | BPF_X] = mov_reg64, 1503 [BPF_ALU64 | BPF_MOV | BPF_K] = mov_imm64, 1504 [BPF_ALU64 | BPF_XOR | BPF_X] = xor_reg64, 1505 [BPF_ALU64 | BPF_XOR | BPF_K] = xor_imm64, 1506 [BPF_ALU64 | BPF_AND | BPF_X] = and_reg64, 1507 [BPF_ALU64 | BPF_AND | BPF_K] = and_imm64, 1508 [BPF_ALU64 | BPF_OR | BPF_X] = or_reg64, 1509 [BPF_ALU64 | BPF_OR | BPF_K] = or_imm64, 1510 [BPF_ALU64 | BPF_ADD | BPF_X] = add_reg64, 1511 [BPF_ALU64 | BPF_ADD | BPF_K] = add_imm64, 1512 [BPF_ALU64 | BPF_SUB | BPF_X] = sub_reg64, 1513 [BPF_ALU64 | BPF_SUB | BPF_K] = sub_imm64, 1514 [BPF_ALU64 | BPF_LSH | BPF_K] = shl_imm64, 1515 [BPF_ALU64 | BPF_RSH | BPF_K] = shr_imm64, 1516 [BPF_ALU | BPF_MOV | BPF_X] = mov_reg, 1517 [BPF_ALU | BPF_MOV | BPF_K] = mov_imm, 1518 [BPF_ALU | BPF_XOR | BPF_X] = xor_reg, 1519 [BPF_ALU | BPF_XOR | BPF_K] = xor_imm, 1520 [BPF_ALU | BPF_AND | BPF_X] = and_reg, 1521 [BPF_ALU | BPF_AND | BPF_K] = and_imm, 1522 [BPF_ALU | BPF_OR | BPF_X] = or_reg, 1523 [BPF_ALU | BPF_OR | BPF_K] = or_imm, 1524 [BPF_ALU | BPF_ADD | BPF_X] = add_reg, 1525 [BPF_ALU | BPF_ADD | BPF_K] = add_imm, 1526 [BPF_ALU | BPF_SUB | BPF_X] = sub_reg, 1527 [BPF_ALU | BPF_SUB | BPF_K] = sub_imm, 1528 [BPF_ALU | BPF_LSH | BPF_K] = shl_imm, 1529 [BPF_ALU | BPF_END | BPF_X] = end_reg32, 1530 [BPF_LD | BPF_IMM | BPF_DW] = imm_ld8, 1531 [BPF_LD | BPF_ABS | BPF_B] = data_ld1, 1532 [BPF_LD | BPF_ABS | BPF_H] = data_ld2, 1533 [BPF_LD | BPF_ABS | BPF_W] = data_ld4, 1534 [BPF_LD | BPF_IND | BPF_B] = data_ind_ld1, 1535 [BPF_LD | BPF_IND | BPF_H] = data_ind_ld2, 1536 [BPF_LD | BPF_IND | BPF_W] = data_ind_ld4, 1537 [BPF_LDX | BPF_MEM | BPF_B] = mem_ldx1, 1538 [BPF_LDX | BPF_MEM | BPF_H] = mem_ldx2, 1539 [BPF_LDX | BPF_MEM | BPF_W] = mem_ldx4, 1540 [BPF_LDX | BPF_MEM | BPF_DW] = mem_ldx8, 1541 [BPF_STX | BPF_MEM | BPF_B] = mem_stx1, 1542 [BPF_STX | BPF_MEM | BPF_H] = mem_stx2, 1543 [BPF_STX | BPF_MEM | BPF_W] = mem_stx4, 1544 [BPF_STX | BPF_MEM | BPF_DW] = mem_stx8, 1545 [BPF_ST | BPF_MEM | BPF_B] = mem_st1, 1546 [BPF_ST | BPF_MEM | BPF_H] = mem_st2, 1547 [BPF_ST | BPF_MEM | BPF_W] = mem_st4, 1548 [BPF_ST | BPF_MEM | BPF_DW] = mem_st8, 1549 [BPF_JMP | BPF_JA | BPF_K] = jump, 1550 [BPF_JMP | BPF_JEQ | BPF_K] = jeq_imm, 1551 [BPF_JMP | BPF_JGT | BPF_K] = jgt_imm, 1552 [BPF_JMP | BPF_JGE | BPF_K] = jge_imm, 1553 [BPF_JMP | BPF_JLT | BPF_K] = jlt_imm, 1554 [BPF_JMP | BPF_JLE | BPF_K] = jle_imm, 1555 [BPF_JMP | BPF_JSET | BPF_K] = jset_imm, 1556 [BPF_JMP | BPF_JNE | BPF_K] = jne_imm, 1557 [BPF_JMP | BPF_JEQ | BPF_X] = jeq_reg, 1558 [BPF_JMP | BPF_JGT | BPF_X] = jgt_reg, 1559 [BPF_JMP | BPF_JGE | BPF_X] = jge_reg, 1560 [BPF_JMP | BPF_JLT | BPF_X] = jlt_reg, 1561 [BPF_JMP | BPF_JLE | BPF_X] = jle_reg, 1562 [BPF_JMP | BPF_JSET | BPF_X] = jset_reg, 1563 [BPF_JMP | BPF_JNE | BPF_X] = jne_reg, 1564 [BPF_JMP | BPF_EXIT] = goto_out, 1565 }; 1566 1567 /* --- Misc code --- */ 1568 static void br_set_offset(u64 *instr, u16 offset) 1569 { 1570 u16 addr_lo, addr_hi; 1571 1572 addr_lo = offset & (OP_BR_ADDR_LO >> __bf_shf(OP_BR_ADDR_LO)); 1573 addr_hi = offset != addr_lo; 1574 *instr &= ~(OP_BR_ADDR_HI | OP_BR_ADDR_LO); 1575 *instr |= FIELD_PREP(OP_BR_ADDR_HI, addr_hi); 1576 *instr |= FIELD_PREP(OP_BR_ADDR_LO, addr_lo); 1577 } 1578 1579 /* --- Assembler logic --- */ 1580 static int nfp_fixup_branches(struct nfp_prog *nfp_prog) 1581 { 1582 struct nfp_insn_meta *meta, *next; 1583 u32 off, br_idx; 1584 u32 idx; 1585 1586 nfp_for_each_insn_walk2(nfp_prog, meta, next) { 1587 if (meta->skip) 1588 continue; 1589 if (BPF_CLASS(meta->insn.code) != BPF_JMP) 1590 continue; 1591 1592 br_idx = nfp_prog_offset_to_index(nfp_prog, next->off) - 1; 1593 if (!nfp_is_br(nfp_prog->prog[br_idx])) { 1594 pr_err("Fixup found block not ending in branch %d %02x %016llx!!\n", 1595 br_idx, meta->insn.code, nfp_prog->prog[br_idx]); 1596 return -ELOOP; 1597 } 1598 /* Leave special branches for later */ 1599 if (FIELD_GET(OP_BR_SPECIAL, nfp_prog->prog[br_idx])) 1600 continue; 1601 1602 /* Find the target offset in assembler realm */ 1603 off = meta->insn.off; 1604 if (!off) { 1605 pr_err("Fixup found zero offset!!\n"); 1606 return -ELOOP; 1607 } 1608 1609 while (off && nfp_meta_has_next(nfp_prog, next)) { 1610 next = nfp_meta_next(next); 1611 off--; 1612 } 1613 if (off) { 1614 pr_err("Fixup found too large jump!! %d\n", off); 1615 return -ELOOP; 1616 } 1617 1618 if (next->skip) { 1619 pr_err("Branch landing on removed instruction!!\n"); 1620 return -ELOOP; 1621 } 1622 1623 for (idx = nfp_prog_offset_to_index(nfp_prog, meta->off); 1624 idx <= br_idx; idx++) { 1625 if (!nfp_is_br(nfp_prog->prog[idx])) 1626 continue; 1627 br_set_offset(&nfp_prog->prog[idx], next->off); 1628 } 1629 } 1630 1631 /* Fixup 'goto out's separately, they can be scattered around */ 1632 for (br_idx = 0; br_idx < nfp_prog->prog_len; br_idx++) { 1633 enum br_special special; 1634 1635 if ((nfp_prog->prog[br_idx] & OP_BR_BASE_MASK) != OP_BR_BASE) 1636 continue; 1637 1638 special = FIELD_GET(OP_BR_SPECIAL, nfp_prog->prog[br_idx]); 1639 switch (special) { 1640 case OP_BR_NORMAL: 1641 break; 1642 case OP_BR_GO_OUT: 1643 br_set_offset(&nfp_prog->prog[br_idx], 1644 nfp_prog->tgt_out); 1645 break; 1646 case OP_BR_GO_ABORT: 1647 br_set_offset(&nfp_prog->prog[br_idx], 1648 nfp_prog->tgt_abort); 1649 break; 1650 } 1651 1652 nfp_prog->prog[br_idx] &= ~OP_BR_SPECIAL; 1653 } 1654 1655 return 0; 1656 } 1657 1658 static void nfp_intro(struct nfp_prog *nfp_prog) 1659 { 1660 wrp_immed(nfp_prog, plen_reg(nfp_prog), GENMASK(13, 0)); 1661 emit_alu(nfp_prog, plen_reg(nfp_prog), 1662 plen_reg(nfp_prog), ALU_OP_AND, pv_len(nfp_prog)); 1663 } 1664 1665 static void nfp_outro_tc_legacy(struct nfp_prog *nfp_prog) 1666 { 1667 const u8 act2code[] = { 1668 [NN_ACT_TC_DROP] = 0x22, 1669 [NN_ACT_TC_REDIR] = 0x24 1670 }; 1671 /* Target for aborts */ 1672 nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog); 1673 wrp_immed(nfp_prog, reg_both(0), 0); 1674 1675 /* Target for normal exits */ 1676 nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog); 1677 /* Legacy TC mode: 1678 * 0 0x11 -> pass, count as stat0 1679 * -1 drop 0x22 -> drop, count as stat1 1680 * redir 0x24 -> redir, count as stat1 1681 * ife mark 0x21 -> pass, count as stat1 1682 * ife + tx 0x24 -> redir, count as stat1 1683 */ 1684 emit_br_byte_neq(nfp_prog, reg_b(0), 0xff, 0, nfp_prog->tgt_done, 2); 1685 wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS); 1686 emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x11), SHF_SC_L_SHF, 16); 1687 1688 emit_br(nfp_prog, BR_UNC, nfp_prog->tgt_done, 1); 1689 emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(act2code[nfp_prog->act]), 1690 SHF_SC_L_SHF, 16); 1691 } 1692 1693 static void nfp_outro_tc_da(struct nfp_prog *nfp_prog) 1694 { 1695 /* TC direct-action mode: 1696 * 0,1 ok NOT SUPPORTED[1] 1697 * 2 drop 0x22 -> drop, count as stat1 1698 * 4,5 nuke 0x02 -> drop 1699 * 7 redir 0x44 -> redir, count as stat2 1700 * * unspec 0x11 -> pass, count as stat0 1701 * 1702 * [1] We can't support OK and RECLASSIFY because we can't tell TC 1703 * the exact decision made. We are forced to support UNSPEC 1704 * to handle aborts so that's the only one we handle for passing 1705 * packets up the stack. 1706 */ 1707 /* Target for aborts */ 1708 nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog); 1709 1710 emit_br_def(nfp_prog, nfp_prog->tgt_done, 2); 1711 1712 wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS); 1713 emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x11), SHF_SC_L_SHF, 16); 1714 1715 /* Target for normal exits */ 1716 nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog); 1717 1718 /* if R0 > 7 jump to abort */ 1719 emit_alu(nfp_prog, reg_none(), reg_imm(7), ALU_OP_SUB, reg_b(0)); 1720 emit_br(nfp_prog, BR_BLO, nfp_prog->tgt_abort, 0); 1721 wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS); 1722 1723 wrp_immed(nfp_prog, reg_b(2), 0x41221211); 1724 wrp_immed(nfp_prog, reg_b(3), 0x41001211); 1725 1726 emit_shf(nfp_prog, reg_a(1), 1727 reg_none(), SHF_OP_NONE, reg_b(0), SHF_SC_L_SHF, 2); 1728 1729 emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0)); 1730 emit_shf(nfp_prog, reg_a(2), 1731 reg_imm(0xf), SHF_OP_AND, reg_b(2), SHF_SC_R_SHF, 0); 1732 1733 emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0)); 1734 emit_shf(nfp_prog, reg_b(2), 1735 reg_imm(0xf), SHF_OP_AND, reg_b(3), SHF_SC_R_SHF, 0); 1736 1737 emit_br_def(nfp_prog, nfp_prog->tgt_done, 2); 1738 1739 emit_shf(nfp_prog, reg_b(2), 1740 reg_a(2), SHF_OP_OR, reg_b(2), SHF_SC_L_SHF, 4); 1741 emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_b(2), SHF_SC_L_SHF, 16); 1742 } 1743 1744 static void nfp_outro_xdp(struct nfp_prog *nfp_prog) 1745 { 1746 /* XDP return codes: 1747 * 0 aborted 0x82 -> drop, count as stat3 1748 * 1 drop 0x22 -> drop, count as stat1 1749 * 2 pass 0x11 -> pass, count as stat0 1750 * 3 tx 0x44 -> redir, count as stat2 1751 * * unknown 0x82 -> drop, count as stat3 1752 */ 1753 /* Target for aborts */ 1754 nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog); 1755 1756 emit_br_def(nfp_prog, nfp_prog->tgt_done, 2); 1757 1758 wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS); 1759 emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x82), SHF_SC_L_SHF, 16); 1760 1761 /* Target for normal exits */ 1762 nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog); 1763 1764 /* if R0 > 3 jump to abort */ 1765 emit_alu(nfp_prog, reg_none(), reg_imm(3), ALU_OP_SUB, reg_b(0)); 1766 emit_br(nfp_prog, BR_BLO, nfp_prog->tgt_abort, 0); 1767 1768 wrp_immed(nfp_prog, reg_b(2), 0x44112282); 1769 1770 emit_shf(nfp_prog, reg_a(1), 1771 reg_none(), SHF_OP_NONE, reg_b(0), SHF_SC_L_SHF, 3); 1772 1773 emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0)); 1774 emit_shf(nfp_prog, reg_b(2), 1775 reg_imm(0xff), SHF_OP_AND, reg_b(2), SHF_SC_R_SHF, 0); 1776 1777 emit_br_def(nfp_prog, nfp_prog->tgt_done, 2); 1778 1779 wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS); 1780 emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_b(2), SHF_SC_L_SHF, 16); 1781 } 1782 1783 static void nfp_outro(struct nfp_prog *nfp_prog) 1784 { 1785 switch (nfp_prog->act) { 1786 case NN_ACT_DIRECT: 1787 nfp_outro_tc_da(nfp_prog); 1788 break; 1789 case NN_ACT_TC_DROP: 1790 case NN_ACT_TC_REDIR: 1791 nfp_outro_tc_legacy(nfp_prog); 1792 break; 1793 case NN_ACT_XDP: 1794 nfp_outro_xdp(nfp_prog); 1795 break; 1796 } 1797 } 1798 1799 static int nfp_translate(struct nfp_prog *nfp_prog) 1800 { 1801 struct nfp_insn_meta *meta; 1802 int i, err; 1803 1804 nfp_intro(nfp_prog); 1805 if (nfp_prog->error) 1806 return nfp_prog->error; 1807 1808 list_for_each_entry(meta, &nfp_prog->insns, l) { 1809 instr_cb_t cb = instr_cb[meta->insn.code]; 1810 1811 meta->off = nfp_prog_current_offset(nfp_prog); 1812 1813 if (meta->skip) { 1814 nfp_prog->n_translated++; 1815 continue; 1816 } 1817 1818 if (nfp_meta_has_prev(nfp_prog, meta) && 1819 nfp_meta_prev(meta)->double_cb) 1820 cb = nfp_meta_prev(meta)->double_cb; 1821 if (!cb) 1822 return -ENOENT; 1823 err = cb(nfp_prog, meta); 1824 if (err) 1825 return err; 1826 1827 nfp_prog->n_translated++; 1828 } 1829 1830 nfp_outro(nfp_prog); 1831 if (nfp_prog->error) 1832 return nfp_prog->error; 1833 1834 for (i = 0; i < NFP_USTORE_PREFETCH_WINDOW; i++) 1835 emit_nop(nfp_prog); 1836 if (nfp_prog->error) 1837 return nfp_prog->error; 1838 1839 return nfp_fixup_branches(nfp_prog); 1840 } 1841 1842 static int 1843 nfp_prog_prepare(struct nfp_prog *nfp_prog, const struct bpf_insn *prog, 1844 unsigned int cnt) 1845 { 1846 unsigned int i; 1847 1848 for (i = 0; i < cnt; i++) { 1849 struct nfp_insn_meta *meta; 1850 1851 meta = kzalloc(sizeof(*meta), GFP_KERNEL); 1852 if (!meta) 1853 return -ENOMEM; 1854 1855 meta->insn = prog[i]; 1856 meta->n = i; 1857 1858 list_add_tail(&meta->l, &nfp_prog->insns); 1859 } 1860 1861 return 0; 1862 } 1863 1864 /* --- Optimizations --- */ 1865 static void nfp_bpf_opt_reg_init(struct nfp_prog *nfp_prog) 1866 { 1867 struct nfp_insn_meta *meta; 1868 1869 list_for_each_entry(meta, &nfp_prog->insns, l) { 1870 struct bpf_insn insn = meta->insn; 1871 1872 /* Programs converted from cBPF start with register xoring */ 1873 if (insn.code == (BPF_ALU64 | BPF_XOR | BPF_X) && 1874 insn.src_reg == insn.dst_reg) 1875 continue; 1876 1877 /* Programs start with R6 = R1 but we ignore the skb pointer */ 1878 if (insn.code == (BPF_ALU64 | BPF_MOV | BPF_X) && 1879 insn.src_reg == 1 && insn.dst_reg == 6) 1880 meta->skip = true; 1881 1882 /* Return as soon as something doesn't match */ 1883 if (!meta->skip) 1884 return; 1885 } 1886 } 1887 1888 /* Remove masking after load since our load guarantees this is not needed */ 1889 static void nfp_bpf_opt_ld_mask(struct nfp_prog *nfp_prog) 1890 { 1891 struct nfp_insn_meta *meta1, *meta2; 1892 const s32 exp_mask[] = { 1893 [BPF_B] = 0x000000ffU, 1894 [BPF_H] = 0x0000ffffU, 1895 [BPF_W] = 0xffffffffU, 1896 }; 1897 1898 nfp_for_each_insn_walk2(nfp_prog, meta1, meta2) { 1899 struct bpf_insn insn, next; 1900 1901 insn = meta1->insn; 1902 next = meta2->insn; 1903 1904 if (BPF_CLASS(insn.code) != BPF_LD) 1905 continue; 1906 if (BPF_MODE(insn.code) != BPF_ABS && 1907 BPF_MODE(insn.code) != BPF_IND) 1908 continue; 1909 1910 if (next.code != (BPF_ALU64 | BPF_AND | BPF_K)) 1911 continue; 1912 1913 if (!exp_mask[BPF_SIZE(insn.code)]) 1914 continue; 1915 if (exp_mask[BPF_SIZE(insn.code)] != next.imm) 1916 continue; 1917 1918 if (next.src_reg || next.dst_reg) 1919 continue; 1920 1921 meta2->skip = true; 1922 } 1923 } 1924 1925 static void nfp_bpf_opt_ld_shift(struct nfp_prog *nfp_prog) 1926 { 1927 struct nfp_insn_meta *meta1, *meta2, *meta3; 1928 1929 nfp_for_each_insn_walk3(nfp_prog, meta1, meta2, meta3) { 1930 struct bpf_insn insn, next1, next2; 1931 1932 insn = meta1->insn; 1933 next1 = meta2->insn; 1934 next2 = meta3->insn; 1935 1936 if (BPF_CLASS(insn.code) != BPF_LD) 1937 continue; 1938 if (BPF_MODE(insn.code) != BPF_ABS && 1939 BPF_MODE(insn.code) != BPF_IND) 1940 continue; 1941 if (BPF_SIZE(insn.code) != BPF_W) 1942 continue; 1943 1944 if (!(next1.code == (BPF_LSH | BPF_K | BPF_ALU64) && 1945 next2.code == (BPF_RSH | BPF_K | BPF_ALU64)) && 1946 !(next1.code == (BPF_RSH | BPF_K | BPF_ALU64) && 1947 next2.code == (BPF_LSH | BPF_K | BPF_ALU64))) 1948 continue; 1949 1950 if (next1.src_reg || next1.dst_reg || 1951 next2.src_reg || next2.dst_reg) 1952 continue; 1953 1954 if (next1.imm != 0x20 || next2.imm != 0x20) 1955 continue; 1956 1957 meta2->skip = true; 1958 meta3->skip = true; 1959 } 1960 } 1961 1962 static int nfp_bpf_optimize(struct nfp_prog *nfp_prog) 1963 { 1964 nfp_bpf_opt_reg_init(nfp_prog); 1965 1966 nfp_bpf_opt_ld_mask(nfp_prog); 1967 nfp_bpf_opt_ld_shift(nfp_prog); 1968 1969 return 0; 1970 } 1971 1972 static int nfp_bpf_ustore_calc(struct nfp_prog *nfp_prog, __le64 *ustore) 1973 { 1974 int i; 1975 1976 for (i = 0; i < nfp_prog->prog_len; i++) { 1977 int err; 1978 1979 err = nfp_ustore_check_valid_no_ecc(nfp_prog->prog[i]); 1980 if (err) 1981 return err; 1982 1983 nfp_prog->prog[i] = nfp_ustore_calc_ecc_insn(nfp_prog->prog[i]); 1984 1985 ustore[i] = cpu_to_le64(nfp_prog->prog[i]); 1986 } 1987 1988 return 0; 1989 } 1990 1991 /** 1992 * nfp_bpf_jit() - translate BPF code into NFP assembly 1993 * @filter: kernel BPF filter struct 1994 * @prog_mem: memory to store assembler instructions 1995 * @act: action attached to this eBPF program 1996 * @prog_start: offset of the first instruction when loaded 1997 * @prog_done: where to jump on exit 1998 * @prog_sz: size of @prog_mem in instructions 1999 * @res: achieved parameters of translation results 2000 */ 2001 int 2002 nfp_bpf_jit(struct bpf_prog *filter, void *prog_mem, 2003 enum nfp_bpf_action_type act, 2004 unsigned int prog_start, unsigned int prog_done, 2005 unsigned int prog_sz, struct nfp_bpf_result *res) 2006 { 2007 struct nfp_prog *nfp_prog; 2008 int ret; 2009 2010 nfp_prog = kzalloc(sizeof(*nfp_prog), GFP_KERNEL); 2011 if (!nfp_prog) 2012 return -ENOMEM; 2013 2014 INIT_LIST_HEAD(&nfp_prog->insns); 2015 nfp_prog->act = act; 2016 nfp_prog->start_off = prog_start; 2017 nfp_prog->tgt_done = prog_done; 2018 2019 ret = nfp_prog_prepare(nfp_prog, filter->insnsi, filter->len); 2020 if (ret) 2021 goto out; 2022 2023 ret = nfp_prog_verify(nfp_prog, filter); 2024 if (ret) 2025 goto out; 2026 2027 ret = nfp_bpf_optimize(nfp_prog); 2028 if (ret) 2029 goto out; 2030 2031 nfp_prog->num_regs = MAX_BPF_REG; 2032 nfp_prog->regs_per_thread = 32; 2033 2034 nfp_prog->prog = prog_mem; 2035 nfp_prog->__prog_alloc_len = prog_sz; 2036 2037 ret = nfp_translate(nfp_prog); 2038 if (ret) { 2039 pr_err("Translation failed with error %d (translated: %u)\n", 2040 ret, nfp_prog->n_translated); 2041 ret = -EINVAL; 2042 goto out; 2043 } 2044 2045 ret = nfp_bpf_ustore_calc(nfp_prog, (__force __le64 *)prog_mem); 2046 2047 res->n_instr = nfp_prog->prog_len; 2048 res->dense_mode = false; 2049 out: 2050 nfp_prog_free(nfp_prog); 2051 2052 return ret; 2053 } 2054